checkm8 vs DarkSword: Why the iOS Exploit Everyone Is Talking About Is Not a Jailbreak

The jailbreak community is watching DarkSword closely — but the criminal iOS exploit kit and checkm8-based tools like palera1n are fundamentally different things. Here's what actually matters for jailbreakers, and what total beginners need to know.

The jailbreak community is paying close attention to DarkSword — the sophisticated iOS exploit kit disclosed this week by iVerify, Lookout, and Google. And understandably so. The six CVEs it chains together represent serious kernel-level primitives on iOS 18.4 through 18.7, the kind of deep system access that jailbreak developers spend years chasing. But before the excitement gets too far ahead of reality, it’s worth being clear about what DarkSword actually is — and what it absolutely is not.

checkm8 vs DarkSword — jailbreak vs exploit kit
checkm8 and DarkSword both exploit iOS — but they are worlds apart in purpose, method, and availability

DarkSword Is Not a Jailbreak Tool

DarkSword is a criminal exploit kit. It was built by well-funded threat actors — suspected Russian espionage groups, a Turkish surveillance vendor, and financially motivated hackers — to silently steal passwords, cryptocurrency wallets, messages, and photos from targeted iPhones. It operates entirely in the background, leaves no trace, and exits after exfiltrating your data. There is no Sileo. No Cydia. No tweaks. No package manager. It has nothing to do with the jailbreak community and nothing to offer it.

The exploits themselves have also already been patched. Apple fixed all six CVEs in iOS 26.3, with most patched even earlier. DarkSword’s attack surface no longer exists on a fully updated iPhone.

The checkm8 Difference

The jailbreak most relevant to modern iOS — including iOS 18.7 on devices like the iPad 7th generation — is palera1n, which leverages the checkm8 vulnerability. This is a completely different class of exploit, and the distinction matters enormously:

  • checkm8 is a hardware vulnerability in the SecureROM of Apple A5 through A11 chips. It exists at the silicon level and Apple cannot patch it with a software update — ever. It will be exploitable on affected devices for the lifetime of those chips
  • checkm8 requires physical access — you have to plug the device into a computer and boot it into DFU mode yourself. Nobody can exploit it remotely. Nobody can deliver it through a website
  • DarkSword is a software exploit chain targeting specific iOS versions — delivered silently through compromised websites in Safari, with no physical access and no user interaction beyond visiting a page
  • checkm8 is semi-tethered — on each reboot the device needs to be re-exploited from a computer. DarkSword ran once, stole everything it needed, and disappeared

The practical upshot: if you’re running iOS 18.7 on an iPad 7th generation via palera1n, your jailbreak is rooted in a hardware flaw that gives you control of your own device. DarkSword was a criminal tool that gave threat actors control of other people’s devices without their knowledge.

What the Jailbreak Community Is Actually Watching

The more interesting question — and the one the jailbreak community is genuinely excited about — is whether the kernel primitives used in DarkSword could inform future public jailbreak research. The answer is: possibly, eventually, but not any time soon.

DarkSword’s CVEs are already patched. Any public jailbreak built on them would only work on unpatched devices, and the window for those is closing fast as users update. More importantly, threat actors have every incentive to keep their research private — a published jailbreak tool triggers immediate Apple patches and kills their operational capability.

As of today, ios.cfw.guide — the most reliable reference for jailbreak availability — shows no public jailbreak for A12 or newer devices running iOS 16.6 or later. DarkSword hasn’t changed that. The jailbreak community remains in a waiting game for new primitives to surface on modern chips, and criminal exploit kits — however sophisticated — don’t shorten that wait.

What This Means If You Are New to Jailbreaking

If you’re just getting started and this whole story has you confused, here’s the plain-English version:

  • Jailbreaking is legal in the US and most countries, and it’s something you choose to do yourself to your own device — with full knowledge and control
  • DarkSword is the opposite — it’s malware that criminals used to secretly break into other people’s iPhones without their knowledge or consent
  • The exploits DarkSword used are already patched — if you’re on iOS 26.3.1 you are not at risk
  • No jailbreak currently exists for modern iPhones (A12 chip or newer, iOS 16.6 or later). If a website is claiming to offer one, it is almost certainly a scam or malware
  • The safest reference for what’s actually jailbreakable is ios.cfw.guide — a community-maintained guide that lists only verified, working tools
  • If your device qualifies (older chip, older iOS), tools like palera1n are legitimate, open source, and widely used. But always follow a proper guide and backup your device first

The bottom line: DarkSword is a serious criminal threat that has been patched. It is not a jailbreak, not available to the public, and not something the jailbreak community had any hand in. Keep your iPhone updated, and check ios.cfw.guide if you want to know the real state of jailbreaking.